Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Structural Geology Algorithms: Vectors and Tensors
Structural Geology Algorithms: Vectors and Tensors

State-of-the-art analysis of geological structures has become increasingly quantitative but traditionally, graphical methods are used in teaching. This innovative lab book provides a unified methodology for problem-solving in structural geology using linear algebra and computation. Assuming only limited mathematical training, the book begins...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)
Applied Data Mining: Statistical Methods for Business and Industry (Statistics in Practice)

Data mining can be defined as the process of selection, exploration and modelling of large databases, in order to discover models and patterns. The increasing availability of data in the current information society has led to the need for valid tools for its modelling and analysis. Data mining and applied statistical methods are the...

The SEO Battlefield: Winning Strategies for Search Marketing Programs
The SEO Battlefield: Winning Strategies for Search Marketing Programs

Welcome to the battlefield. Every day, companies ranging from startups to enterprises fight to achieve high search rankings, knowing that previous success can quickly vanish. With this practical guide, you’ll learn how to put search engine optimization (SEO) methodology into practice, including the research, data analysis, and...

iOS Programming: The Big Nerd Ranch Guide (5th Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (5th Edition) (Big Nerd Ranch Guides)

iOS Programming: The Big Nerd Ranch Guide leads you through the essential concepts, tools, and techniques for developing iOS applications. After completing this book, you will have the know-how and the confidence you need to tackle iOS projects of your own. Based on Big Nerd Ranch's popular iOS Bootcamp course and its...

Action Analysis for Animators
Action Analysis for Animators

Action Analysis is one of the fundamental princples of animation that underpins all types of animation: 2d, 3d, computer animation, stop motion, etc. This is a fundamental skill that all animators need to create polished, believable animation. An example of Action Analysis would be Shrek's swagger in the film, Shrek. The animators clearly...

Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition
Data Mining: Concepts, Models, Methods, and Algorithms, Second Edition
Now updated—the systematic introductory guide to modern analysis of large data sets

As data sets continue to grow in size and complexity, there has been an inevitable move towards indirect, automatic, and intelligent data analysis in which the analyst works via more complex and sophisticated software tools. This book...

Applied Engineering Failure Analysis: Theory and Practice
Applied Engineering Failure Analysis: Theory and Practice

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for...

Statistical Methods for Environmental Epidemiology with R: A Case Study in Air Pollution and Health (Use R!)
Statistical Methods for Environmental Epidemiology with R: A Case Study in Air Pollution and Health (Use R!)
As an area of statistical application, environmental epidemiology and more speci cally, the estimation of health risk associated with the exposure to - vironmental agents, has led to the development of several statistical methods and software that can then be applied to other scienti c areas. The stat- tical analyses aimed at addressing...
Handbook of Computer Vision Algorithms in Image Algebra
Handbook of Computer Vision Algorithms in Image Algebra
Image algebra is a comprehensive, unifying theory of image transformations, image analysis, and image understanding. In 1996, the bestselling first edition of the Handbook of Computer Vision Algorithms in Image Algebra introduced engineers, scientists, and students to this powerful tool, its basic concepts, and its use in the concise...
Active Rules in Database Systems (Monographs in Computer Science)
Active Rules in Database Systems (Monographs in Computer Science)
A timely survey of the field from the point of view of some of the subject's most active researchers. Divided into several parts organized by theme, the book first covers the underlying methodology regarding active rules, followed by formal specification, rule analysis, performance analysis, and support tools. It then moves on to the...
Result Page: 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy